Nettitude Blog

How to Configure your Identity and Access Management Controls (IAM)

Posted by Nettitude on Apr 28, 2020 11:37:33 AM

By Mike Buckley | Pre-Sales Consultant at Nettitude

Are you confident your critical business systems are secure? Willing to bet your career on it? Whilst fairly easy to manage if you have the right systems and procedures in place, if your identity and access management controls are not configured correctly, it could be like leaving the front door of your house wide open. The challenge that many of our clients’ face is working out to what extent they need to configure access to their business-critical systems. With too many controls in place, it can be disruptive to work flow and cause projects to become overdue. However, with too much freedom, you risk compromise to those critical systems. So how do you get the balance right?

Below, we’ve compiled some of our expert in-house knowledge to help businesses get a better idea of how to strike a balance when it comes to identity and access management controls.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

What impact is the COVID-19 pandemic having on the cybersecurity of the Marine and Offshore Industries?

Posted by Nettitude on Apr 24, 2020 11:06:48 AM

By Nettitude

On Wednesday the 11th of March 2020, the Director General of the World Health Organisation (WHO) officially used the term ‘pandemic’ to describe the COVID-19 outbreak, causing many countries to shut their borders, lockdowns to be put in place across a third of the world, and economic activity to begin to slow. Whilst the impact on the shipping industry was only marginalised to begin with, China is a major player within the global shipping sector and as a key partner for many countries maritime activity. This meant that the world quickly began to feel the effects of COVID-19, before it had even spread beyond the confines of China. As the virus progressed on a global scale, the threat level quickly escalated in many countries, and as a result, the cruise and shipping industries began to feel the full force of COVID-19.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, Marine and Offshore

Vulnerabilities in JETSELECT Superyacht software

Posted by Nettitude on Apr 16, 2020 4:26:10 PM

Nettitude has recently conducted a number of projects focused on Marine & Offshore (M&O) technologies.  The objective of one such M&O project was to find and exploit vulnerabilities in the software and hardware found on a superyacht.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area

How to identify a data breach under GDPR

Posted by Nettitude on Apr 15, 2020 1:58:39 PM

By Christopher Laing | Security Consultant at Nettitude 

Please note: The following blog post is relevant to our UK and European readers specifically, although the concept of identifying a data breach is relevant on a global scale.

In our line of work, we very often see businesses rush into panic mode when they suspect a data breach. From releasing confidential information to a body who does not have permission to view it, to secure systems being hacked, there are many ways that personal data can be exposed either intentionally by malicious activity, or unintentionally by internal staff. Whilst there are some simple best-practice housekeeping which can be applied to prevent such breaches, unfortunately, data leaks still happen. The key to handling such data breaches, is firstly, knowing how to identify one.

Whilst it can seem like a major disaster at the time, sending your workforce into panic mode, sometimes the mishandling of data isn’t yet a breach. In this case, knowing how to identify a data breach is your best asset, before having to cry wolf! In the following blog post, we’ll cover how you can identify a data breach, so that you can take the best appropriate action should your business ever suffer a breach (touch wood!).

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Why Every Disaster Recovery Plan Needs Incident Response (IR)

Posted by Nettitude on Apr 8, 2020 1:25:18 PM

By Graham Stevens | Incident Response Consultant at Nettitude

Most businesses of a certain size will have a range of plans & policies put in place to help them when disaster strikes. These are often referred to as business continuity and disaster recovery documents, which will outline how the business should recover from a natural or human-induced disaster, and will include how the business will continue to run & support critical services or functions, or how to recover their technology infrastructure.

In the following blog post, we will discuss how to prepare a disaster and recovery plan and go into some of the identifying factors between a cyber-incident and a cyber-emergency.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Cybersecurity Maturity Assessments Explained – With Nettitude’s Senior Security Consultant, Richard Hicks.

Posted by Nettitude on Apr 1, 2020 5:45:52 PM

By Richard Hicks | Senior Security Consultant at Nettitude

Cybersecurity doesn’t have a finish line. Whether you’re a small business or a large multi-national organisation, there are always steps and checks you should be completing on a regular basis, one of the most common of which is performing regular penetration testing. There are plenty of organisations out there that are willing to sell you days of effort to test a system, based on fixed scopes, etc., but there is more to security than simply asking someone to mark your homework. A proper cybersecurity framework is one that is custom built and designed for your organisation, there is no one-size fits all in cybersecurity and as such there are a multitude of paths available for you to follow.

Sounds confusing, right? Here at Nettitude, we’re big supporters of the not for profit organisation known as CREST, they are an accreditation and certification body that has helped shape and define information security within the UK and worldwide. CREST regularly publish information, tooling and guidance on cyber security, in which, one such guidance document they provide is the CREST Penetration Testing Guide. This guide provides all the information you need to know about penetration testing, covering the key points of why you would want to stand up a framework, how to size and scope it appropriately to your organisation and crucially as a final step, how to measure the performance and efficacy of your penetration testing programme.

Below We’ll give you a non-biased explanation of what a cyber maturity assessment is, and how CREST can help guide you in the right direction.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Cloud Series | The Key Principles and Challenges of Cloud Security

Posted by Nettitude on Mar 25, 2020 4:27:44 PM

By Mike Buckley | Presales Consultant at Nettitude

For those that have recently been keeping up with our Cloud Research and Innovation Series, you will by now be aware that many businesses across the globe are turning to cloud solutions. IaaS, SaaS and PaaS all have an increasingly large part to play in business IT strategy, and there are a whole host of benefits which are no longer an added convenience but a necessity for the modern 21st century worker. This is now becoming a realisation for most managers and CEO’s, who are battling against time… and competitors, to get cloud technology incorporated into their business infrastructure. However, as you will have found out from our series so far, there are a number of key considerations to make, in which security is frequently an afterthought in the rush to use all the convenient features that cloud technology provides.

Below, we will look at some of the key considerations’ businesses need to make when considering their cloud migration strategy.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Four Types of Network Attacks to Protect Against in 2020

Posted by Nettitude on Mar 17, 2020 1:11:42 PM

By Mike Buckley | Presales Consultant at Nettitude

In today’s ‘always on’ digital world, the rate at which organisations and individuals experience cyber-attacks is continually increasing. The University of Maryland state that on average, there is a hacker attack every 39 seconds, which equates to 2,244 times a day. In response to this, organisations have began to step up their cybersecurity, with Gartner reporting that Worldwide spending on cybersecurity is forecasted to reach $133.7 billion in 2022.

Moreover, we are beginning to see an increasing number of organisations hiring their own in-house cybersecurity specialists and teams to protect against network threats, but for many SME’s, this simply isn’t a feasible option. In this post, we’ll be exploring the top predicted types of network attacks which could affect organisations in 2020.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, SEO Series

Cybersecurity and the Cloud Series – NIST Cybersecurity framework and cloud adoption

Posted by Nettitude on Mar 13, 2020 5:03:11 PM

By Joel Snape | Cybersecurity Researcher at Nettitude

The NIST framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk, produced by the National Institute of Standards and Technology. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders.

Nettitude often base our guidance and solutions around this framework, in which there are some key considerations to be made when adopting cloud technology, based on the NIST framework. Continue reading to discover why the NIST Cybersecurity framework is used and how it relates to cloud adoption.

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area, cloud series

Social Media - Is it a Viable Source of Threat Intelligence?

Posted by Nettitude on Mar 10, 2020 1:24:56 PM

By Phil Buck | Senior Threat Intelligence Analyst at Nettitude

On a 24-hour basis, the Nettitude Security Operations Centre are monitoring our client’s digital environments for potential and current acting threats, in which our trained analyst experts are ready to detect and respond to alerts within a client environment. Through a threat- intelligence led approach, our teams use a number of tools and techniques, from deploying honeytraps, to reverse engineering malware, and monitoring our threat intelligence feeds, these activities are all in the typical day of our SOC team members. However, you may be surprised to hear that we also use social media as a tool to gather intelligence on potential threat actors.

Now that your ears have pricked up, continue reading our latest blog post to find out how social media is used as a viable source of threat intelligence!

Read More

Topics: Cyber Security, Nettitude, News, Security Blog, Cyber Security Blog, Download Area

About Nettitude

Nettitude is the trusted cybersecurity provider to thousands of businesses around the world. We stop at nothing to keep your data and business secure in an age of ever-evolving cyber threats.

In 2018, Nettitude became part of Lloyd’s Register, an 8,000 person strong professional services organisation, with 300 years of heritage in safety and risk management. Nettitude now provides true global coverage, through a network of over 180 offices strategically placed around the globe.

Subscribe Here!

Recent Posts